Whitepaper

Remote collaboration requires endpoint-to-cloud data security

The epic migration to a remote workforce has prompted enterprises to populate the cloud with collaboration and messaging apps so employees can stay virtually connected to business. Slack, Microsoft Teams and other tools augment real-time communication and information sharing to keep employees productive and well informed. With everything going everywhere, how do you protect corporate […]

Remote collaboration requires endpoint-to-cloud data security Read More »

Black market for fake vaccine certificates

 Black market for fake vaccine certificates reaches new peaks, while Delta variant keeps spreading globally Check Point Research continues to monitor the dark marketplace in which COVID 19 Vaccine certifications are sold to anyone willing to pay. Prices have reduced, now ranging between $100-120. Darknet advertisements for COVID-19 vaccines have increased and groups advertising selling

Black market for fake vaccine certificates Read More »

RANSOMWARE: A look at the criminal art of malicious code, pressure, and manipulation

GOALS The goals of this paper are to demonstrate how dangerous ransomware has become, describe the latest techniques used by ransomware gangs, and suggest what your organization can do to reduce exposure to, and damage from, ransomware attacks. Three ransomware attack vectors are addressed in this order: remote access, email, and supply chain. RANSOMWARE —

RANSOMWARE: A look at the criminal art of malicious code, pressure, and manipulation Read More »

Mind the Gap: A Roadmap to IT/OT Alignment

Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are increasingly being connected via the Industrial Internet of Things (IIoT). This creates new challenges in securing industrial environments specifically by making cybersecurity threats even more difficult to detect, investigate

Mind the Gap: A Roadmap to IT/OT Alignment Read More »

A Fresh Look at Trickbot’s Ever-Improving VNC Module

The journey of Trickbot starts almost half a decade ago, when it appeared in the form of a banker and credential-stealing application. Drawing inspiration from Dyre (or Dyreza), Trickbot consists of an ecosystem of plugin modulesand helper components. As of late, the Trickbot group, which has managed to infect millions of computers worldwide, has played

A Fresh Look at Trickbot’s Ever-Improving VNC Module Read More »

Getting Ready for Post-Quantum Cryptography

Cryptographic technologies are used throughout government and industry to authenticate the source and protect the confidentiality and integrity of information that we communicate and store. Cryptographic technologies include a broad range of protocols, schemes, and infrastructures, but they rely on a relatively small collection of cryptographic algorithms. Cryptographic algorithms are the information transformation engines at

Getting Ready for Post-Quantum Cryptography Read More »

WastedLoader’ Campaign Targets Unpatched IE Browsers

Bitdefender has released research on a new RIG Exploit Kit campaign targeting unpatched Internet Explorer web browsers. The campaign exploits VBScript vulnerabilities CVE-2019-0752 and CVE-2018-8174 to deliver a variant of WastedLocker minus the actual ransomware component. The new variant, dubbed WastedLoader by Bitdefender communicates with a C&C acting as a downloader for injecting various payloads

WastedLoader’ Campaign Targets Unpatched IE Browsers Read More »